Post job

Security Architect jobs in Gainesville, FL

- 1,188 Jobs
All
Security Architect
Architect
Information Security Manager
Security Engineer
Senior Security Engineer
Information Security Officer
Information Technology Security Manager
Network Security Architect
Senior Security Analyst
SAP Security Consultant
Information Security Director
  • Security Engineer

    Milestone Technologies, Inc. 4.7company rating

    Security Architect job 309 miles from Gainesville

    Title: Splunk Engineer Duration: 06-months contract Background/Experience Implementing advanced cyber security technology in a complex environment 5+ years of experience; hands-on experience in security engineering, hands-on experience in building, designing, and maintaining enterprise security tools in a Linux environment 5+ years of Scripting experience (using Bash, Python, Go, or other equivalent languages) Hands-on experience with Splunk Administration 3+ years of experience; back-end Splunk Administration (Data ingestion, Splunk Server Configuration, Forwarder Configuration, Basic understanding of Splunk Architecture) Engineer and administer security platforms including SIEM/SOAR systems, endpoint detection and response, vulnerability management, anomaly detection, and cloud analysis Must have 5+ years of scripting experience (using Python or other equivalent languages) Hands-on experience in public cloud infrastructures like AWS (Amazon Web Services) Preferred Security and Cloud certifications are a plus (CISSP, AWS Solution architect) Media/Entertainment or distributed global network experience A minimum of 3+ years of hands-on experience with automation technologies (e.g., Ansible, Terraform, etc.) Soft Skills Hands-on technical experience with networking and computing system architectures, specifically, the security aspects thereof Thorough understanding of information security principles, techniques, principles, policy frameworks, and best practices Hands-on technical experience with compliance and regulatory frameworks and how they affect architecture designs and review Education Splunk Admin Certification The estimated pay range for this position is USD $75.00/hr - USD $85.00/hr.
    $75-85 hourly 17d ago
  • Network Security Architect

    Conglomerateit

    Security Architect job 309 miles from Gainesville

    Role: Network Security Architect Job Type: Contract Tax Term: W2/1099 About us: Conglomerate IT is a certified and a pioneer in providing premium end-to-end Global Workforce Solutions and IT Services to diverse clients across various domains. Visit us at ******************************* Conglomerate IT mission is to establish global cross culture human connections that further the careers of our employees and strengthen the businesses of our clients. We are driven to use the power of global network to connect business with the right people without bias. We provide Global Workforce Solutions with affability. Job Description: The Network Security Architect will design, implement, and manage a Zero Trust-aligned security framework using Palo Alto Networks solutions (Prisma, Cortex, Strata, etc.). This role ensures robust protection for corporate IT, cloud, and operational technology (OT) networks against evolving cyber threats in the manufacturing sector. Key Responsibilities: • Design and deploy Zero Trust Network Access (ZTNA) solutions using Palo Alto Prisma Access. • Segment networks (micro/perimeter-less) with Palo Alto Next-Gen Firewalls (NGFW) and Software-Defined Perimeter (SDP) principles. • Enforce least-privilege access, continuous authentication, and encryption across hybrid environments (on-prem, cloud, OT/IoT). • Architect and optimize Palo Alto Strata (PAN-OS) firewalls for threat prevention, URL filtering, and advanced malware protection. • Deploy Cortex XDR/XSOAR for endpoint security, threat detection, and automated response. • Integrate Prisma Cloud for cloud security posture management (CSPM) and workload protection. • Secure OT/ICS environments (e.g., production lines, PLCs) with Palo Alto IoT security solutions. • Align with industrial standards (IEC 62443, NIST SP 800-82) and mitigate risks like ransomware targeting factories. • Monitor threats via Palo Alto WildFire, AutoFocus, and Cortex XSIAM. • Lead incident response for breaches, ensuring minimal disruption to manufacturing operations. • Ensure compliance with GDPR, CCPA, TISAX (automotive), or NIST CSF. • Partner with IT, DevOps, and OT teams to embed security into CI/CD pipelines and IIoT deployments. Qualifications & Skills: • Palo Alto Expertise: Hands-on experience with PAN-OS, Prisma Access, Cortex XDR, and WildFire. • Zero Trust Implementation: Proven track record deploying ZTNA, SDP, or identity-centric security. • Certifications: Palo Alto PCNSE, CISSP, or CCSK (for cloud security).
    $95k-130k yearly est. 2d ago
  • Security Engineer

    Pacer Staffing

    Security Architect job 280 miles from Gainesville

    Job Title: Security Engineer III Must have: Security Operations / Administration Risk Management / Security Audit/Assessment Support / Ad-hoc support 7 years of IT relevant experience or equivalent combination of experience plus at least 3 years of experience performing Security Engineering / Planning / Operations
    $79k-108k yearly est. 14d ago
  • BISO - Business Information Security Officer

    Globalsource It 4.0company rating

    Security Architect job 296 miles from Gainesville

    GlobalSource IT has a client that is looking to hire a Business Information Security Officer on a Contract to Hire basis. Those with experience in the role of a BISO or those who feel they are ready to step into such a role are encouraged to apply. The BISO team is the IT Security primary point of contact for the assigned IT and business unit teams, driving the creation and supporting the implementation of the security program. As a trusted advisor, the BISO will collect business requirements and will provide advice and oversight to ensure that Information Security policy is complied with for processes and systems. Our client, a leader in the hospitality industry, offers a competitive compensation package and excellent opportunity for advancement. This role will start off as a 6-12 month contract, then convert to an FTE. During the contract period, if you do not live in Miami, you are allowed to work remote. All FTE's are required to work on site in the Miami, FL area. If you're interested in discussing this opportunity, please apply with your resume and contact information and we can coordinate a time to connect. Thank you!
    $92k-134k yearly est. 11d ago
  • Camunda BPM Architect

    New York Technology Partners 4.7company rating

    Security Architect job 309 miles from Gainesville

    Hybrid - Atlanta, GA • Define and own the end-to-end architecture for Java-based microservices applications. • Design scalable, secure, and resilient systems using Spring Boot, Spring Cloud, and Microservices. • Collaborate with business stakeholders, product owners, and engineering teams to align technical solutions with business goals. • Lead architectural reviews, code quality assessments, and performance tuning initiatives. • Establish best practices for API design, service orchestration, and DevOps automation. • Guide and mentor development teams on architecture patterns, tools, and technologies. • Ensure compliance with security, scalability, and maintainability standards. • Evaluate and integrate emerging technologies and tools to improve system performance and developer productivity. • 6+ years of experience in Java development, with 3+ years in an architectural role. • Deep expertise in Java Spring Boot, Spring Cloud, and Microservices architecture. • Proven experience in designing and building Microservices-based architectures. • Strong knowledge of REST APIs, Spring Cloud, Spring Security, and Spring Data JPA. • Experience with SQL and NoSQL databases (e.g., PostgreSQL, MongoDB). • Proficiency with Docker, Kubernetes, and cloud platforms (AWS, Azure, or GCP). • Familiarity with CI/CD tools like Jenkins, GitLab CI, or GitHub Actions. • Experience with message brokers such as Kafka or RabbitMQ. • Excellent problem-solving, communication, and leadership skills. • Strong understanding of RESTful APIs, OAuth2/JWT, and API Gateway patterns. • Experience with cloud platforms (AWS, Azure, or GCP) and container orchestration (Docker, Kubernetes). • Proficiency in CI/CD pipelines, infrastructure as code, and DevOps practices. • Familiarity with event-driven architecture, Kafka, or RabbitMQ. • Strong knowledge of SQL and NoSQL databases. • Excellent communication, leadership, and stakeholder management skills. Years of Experience:6+ years of experience in Java development, with 3+ years in an architectural role
    $90k-135k yearly est. 5d ago
  • Senior Security Engineer

    ACL Digital

    Security Architect job 309 miles from Gainesville

    Title: Sr. Security Engineer Duration: 12 Months Qualifications: 6+ years' experience with SAP Security Design, Implementation and Administration in SAP ECC required, including production support experience with specific experience with SAP Transportation Management System Proficient in SAP authorization concepts, including authorization reporting, troubleshooting transaction codes, and project implementation Strong understanding of Sarbanes Oxley legislation, risks and mitigating controls (segregation of duties, etc) Responsibilities: Responsible for the design, testing, evaluation, implementation, support, management, and deployment of security systems/devices used to safeguard the organization's information assets. Also responsible for analyzing the information security environment and assisting with the development of security measures to safeguard information against accidental or unauthorized modification, destruction, or disclosure. Works with the technical team to recover data after a security breach. Configures and installs firewalls and intrusion detection systems. Develops automation scripts to handle and track incidents. Investigates intrusion incidents, conducts forensic investigations and mounts incident responses. Delivers technical reports and formal papers on test findings. Installs firewalls, data encryption, and other security measures. Maintains access by providing information, resources, and technical support. Ensures authorized access by investigating improper access; revoking access; reporting violations; monitoring information requests by new programming; recommending improvements. Updates job knowledge by participating in educational opportunities; reading professional publications; maintaining personal networks; participating in professional organizations. Accomplishes information systems and organization mission by completing related results as needed. Builds, deploys, and tracks security measurements for computer systems and networks. Mitigates security vulnerabilities by implementing applicable solutions and tools. Performs vulnerability testing, risk analyses, and security assessments. Collaborates with colleagues on authentication, authorization, and encryption solutions. Tests security solutions using industry standard analysis criteria. Responds to information security issues during each stage of a project's lifecycle. Performs risk assessments and testing of data processing systems. Establishes system controls by developing framework for controls and levels of access; recommending improvements Establishes computer and terminal physical security by developing standards, policies, and procedures; coordinates with facilities security; recommends improvements. Safeguards computer files by performing regular backups; developing procedures for source code management and disaster preparedness; recommends improvements. Determines the sensitivity of the data in order to recommend the appropriate security needs. Develops proposals for, and consider cost effective equipment options to satisfy security needs. Communicates with the technical team, management team and users companywide if data security is breached. Designs infrastructure to alert the technical team of detected vulnerabilities. Evaluates new technologies and processes that enhance security capabilities. Supervises changes in software, hardware, facilities, telecommunications and user needs. Defines, implements, and maintains corporate security policies. Analyzes and advises on new security technologies and program conformance. Creates, tests, and implements network disaster recovery plans. Recommends security enhancements and purchases. Trains staff on network and information security procedures. Develops security awareness by providing orientation, educational programs, and on-going communication. Recommends modifications in legal, technical and regulatory areas that affect IT security.
    $89k-122k yearly est. 5d ago
  • MuleSoft Architect (On-site & Full-Time)

    Kyra Solutions 4.1company rating

    Security Architect job 130 miles from Gainesville

    Join Our Team Do you want to make an impact on the world around you? The work we do at Kyra Solutions directly impacts government entities and the citizens they serve. In Transportation, our solutions are designed to save lives on the roadways and in our Regulatory practice, we are designing solutions to make government digital for your accessibility. Kyra works hard to offer long-term growth potential, competitive wages, and continuous professional development for our employees. If you are interested in furthering your career with Kyra and help us improve theway governments serve their citizens, please send your resume, and make sure to include salary expectation, availability, and contact information. You do not want to miss this opportunity! Title : MuleSoft Architect (On-site & Full-Time) | Location : Tallahassee, FL | Duration : Full-Time Required Skills and Experience 7+ years of enterprise integration experience. 5+ years of hands-on experience in MuleSoft Anypoint Platform including API Manager, Runtime Manager, and API Governance. 5+ years in the financial services sector banking, capital markets, or investment firms. Proven experience in integrating with financial partners (e.g., custodians, ACH processors, financial data aggregators, credit card processing). Strong experience in Salesforce Financial Services Cloud integration and data synchronization. Experience with leveraging AI tools for work items throughout the analysis, design, development, and testing lifecycle. Ability to roll up sleeves and dive into code while maintaining a strategic, big-picture architectural view. Excellent communication and stakeholder management skills. Proven leadership and mentoring experience. Primary Responsibilities Lead the end-to-end MuleSoft integration architecture, design, and development lifecycle. Define and enforce API-led connectivity architecture and reusable service layers. Design integration patterns using Anypoint Platform components: API Manager, Runtime Manager, API Governance, Visualizer, and Monitoring. Architect and implement integrations with Salesforce Financial Services Cloud and external financial institutions (e.g., custodians, banks, investment platforms). Own the Agile development of complex MuleSoft flows and components. Provide guidance and mentorship to developers and junior architects. Review and approve code, integration patterns, and performance tuning practices. Collaborate with cross-functional teams including InfoSec, DevOps, Business Analysts, and QA. Education Bachelor's degree in Computer Science, Information Systems, or related field. Certification MuleSoft Architect or Developer certification preferred. Salesforce certifications a plus. Why Kyra? Founded in 1997, Kyra Solutions is a national leader of transportation technology and regulatory solutions in government. We specialize in the art and science of digital transformation in government. Our commitment to providing the highest level of service and tailored solutions has supported our consistent double-digit growth for over a decade. We are headquartered in the greater Tampa Bay area with other offices across Florida and an innovation center in Silicon Valley, CA. Because of our dedication to our employees, we have won one of the Best Companies to Work for in Florida 2 years in a row by Florida Trend magazine. Kyra has won other numerous awards including the coveted INC magazine s one of America s Fastest Growing Companies several years in a row. Kyra s commitment to our employees, to best practices in project management and business analysis, and to solution development has led to our achievement in becoming the first Project Management Institute certified company in Florida. Our proven successful track record has resulted in several prestigious awards including the State of Florida's Diversity Business of the Year Award. We are proud to be a sponsor for the TaxWatch Productivity Awards and partner to Florida TaxWatch. for more information. Background & References Verifiable professional references will be required along with the resume; however, references will be checked/contacted after the interview and before the project starts. Level two background check will be done on the selected candidate for employment, criminal (State & Federal), education, and others as mandated by the client. Please make sure your resume and all other information provided are accurate. Any misrepresentation will mean permanent disqualification by the client. Equal employment opportunity employer.
    $82k-112k yearly est. 26d ago
  • Chief Information Security Officer (Onsite)

    Synovus Financial Corp 4.7company rating

    Security Architect job 309 miles from Gainesville

    Pay Competitive Employment type Full-Time Job Description The Chief Information Security Office (CISO) is responsible for establishing strategy and direction for the enterprise's cybersecurity and privacy-related functions Collaborates with all stakeholders and provides leadership and management in the areas of cybersecurity, privacy, and risk. Leads the establishment of enterprise security stance by developing, implementing, and directing policy, architecture, prevention, detection, investigation, analysis and training processes. Has broad responsibilities to interface with internal and external stakeholders, Board of Directors, audit agencies, and regulators to establish communication, cooperation, and risk management in-line with Synovus' risk tolerance. Job Duties and Responsibilities Develops and delivers comprehensive, system-wide information security strategies that are aligned with organizational goals, objectives and risk appetite. Provides vision, expertise and long range planning in the areas of cybersecurity risk identification, detection, protection, response, and recovery. Keeps abreast of the external environment for new risks, threats and vulnerabilities and their potential impact on information security, cybersecurity, and privacy. Maintains awareness of the external environment for new and emerging strategies and technologies to improve cybersecurity posture, reduce cyber risk exposure, and mitigate risks. Leads the effort to identify, evaluate, justify, and implement strategies and solutions which keeps cybersecurity maturity comparable to peer institutions. Develop and implement and strategies to remain aligned to larger institution cybersecurity capabilities to support Synovus' growth and increased regulatory and control requirements. Develops and implements people, processes, and technology strategies which drive improvements in efficiency, create scalability, and increase speed to detect and respond to security anomalies, threats and events. Initiates, facilitates, and promotes activities to create cybersecurity and privacy awareness within organization. Manages the development and implementation of companywide policies, standards, guidelines, and procedures to ensure ongoing maintenance of security and management of risks. Performs cybersecurity, privacy, and risk assessments of new systems and/or monitors existing systems for compliance with security, and privacy-related policies, procedures, and standards, referring problems to the appropriate stakeholders and following up on appropriate resolutions. Consults with senior IT and business leaders regarding their information, cybersecurity, and privacy risks and responsibility in minimizing those risks. Oversees ongoing system and network health checks on identified high risk network segments, systems, and applications. Oversees the creation and maintenance of information security privacy and policy programs for the company including information in electronic, print and other formats. Assures that information created, acquired or maintained by the company and authorized users is used in accordance with its intended purposes. Protects information and its infrastructure from external or internal threats. Assures that the company complies with statutory and regulatory requirements regarding information access, security and privacy. Performs security risk assessments. Collaborates on testing, audit and government compliance practices and the implementation of systems. Develops and implements an ongoing risk assessment program targeting information security and privacy matters. Recommends methods for vulnerability detection and remediation and oversee vulnerability testing. Recommends methods for detection, investigation, and reduction of risk and financial loss. Develops and implements an Incident Report and Security Incident Response Program which complies with all applicable regulatory requirements and follows industry best practices. Assures that procedures and processes contained within the Security Incident Response Program are tested on a regular basis to validate and demonstrate resiliency. Responds to alleged policy violations or complaints from external parties. Serves as the official point of contact for information security, privacy, financial crimes and security incidents. Handles information security and fraud-related incidents. Assures that retainer agreements are in place for key functions such as outside legal counsel and cyber forensics services. Develops and implements plans for ongoing exercises to test, evaluate, and enhance response plans. Keeps abreast of latest security and privacy legislation, regulations, advisories, alerts and vulnerabilities pertaining to the company's mission. Holds quarterly meetings with Synovus' Chairman and CEO where the CISO will update the Chairman and CEO on the state of the Information Security program. Holds an annual review with the Risk Committee during its Executive Session where the CISO will provide updates on the status of the Bank's Information Security program. Manages the annual performance management and merit processes for direct and indirect reports. Coaches and develops team members and builds a work environment where team members are engaged and feel a positive sense of achievement about their role in the company. Works closely with Human Resources regarding employee relations, compensation, training, posting and filling vacant positions and other Human Resources related matters. Each team member is expected to be aware of risk within their functional area. This includes observing all policies, procedures, laws, regulations and risk limits specific to their role. Additionally, they should raise and report known or suspected violations to the appropriate Company authority in a timely fashion. Performs other related duties as required. The information on this description has been designed to indicate the general nature and level of work performed by employees within this classification. It is not designed to contain or be interpreted as a comprehensive inventory of all duties, responsibilities, and qualifications required of employees assigned to this job. Synovus is an equal opportunity employer committed to fostering an inclusive work environment. Qualifications Minimum Education: Bachelor's Degree in Computer Science, Information Systems, or related field. Master's Degree in a related discipline is preferred. Minimum Experience: Fifteen years of Technology and Security work experience with an emphasis within regulated industries. Five years of leadership experience managing multiple, large, cross-functional teams and projects, influencing senior level management and key stake holders. Required Knowledge, Skills, & Abilities: Leadership experience in managing multiple, large, cross-functional teams or projects Senior level management influence High proficiency in written and oral communication skills Ability to convert strategy to action Strong analytical skills with a view to map processes to automation tools #J-18808-Ljbffr
    $102k-133k yearly est. 14d ago
  • AWS Architect ( Only W2)

    Cygnus Professionals Inc. 3.2company rating

    Security Architect job 309 miles from Gainesville

    Must Skills: Application Development , Data Migration, Application Architecture , AWS EC2 , RDS , S3/Block Storage Must-have Skills: 15+ years of experience in the IT industry - primarily in the Application Development and Application Management 10+ years of experience in the architecture - application architecture, Cloud architecture At least 3 years of experience in AWS - EC2, RDS, S3/Block storage, Data Migration. Experience in migration from on-prem to cloud and/or transformation of migrated applications Experience in Cloud Formation or Terraform, Infrastructure as Code (IAC) Automation of cloud provisioning/deprovisioning using CI/CD, automation scripts. Good experience in Java and J2EE, spring boot and Micro Services architecture Understanding of the principles of microservices design/patterns and anti-patterns Must have excellent oral and written communication skills Must be able to establish relationships with stakeholders Needs to be able to translate stakeholders needs to technical teams Needs to be able to manage ambiguous situation and translate into clear directions for the teams Working experience in DevOps / CI/CD Nice to have experience in FinOps Nice to have AWS certification - AWS Architect Associate, AWS Architect Professional Preferred Qualifications: • AWS Certifications (e.g., AWS Certified Solutions Architect, AWS Certified DevOps Engineer
    $91k-127k yearly est. 2d ago
  • Senior Security Analyst

    Compunnel Inc. 4.4company rating

    Security Architect job 62 miles from Gainesville

    is EXEMPT Professional work that implements, maintains and troubleshoots enterprise security systems in a complex, integrated information technology systems environment. Consults with internal business customers to determine security requirements. Provides technical advice and counsel to less experienced analysts. Required to assist in maintaining 24 X 7 systems availability. IMMEDIATE MANAGER: Manager, Information Security or Manager, Identity & Access Management SUPERVISION/DIRECTION RECEIVED: Limited supervision REQUIRED COMPETENCIES: Advanced - In-depth understanding of the required competencies with advanced skills and abilities, sufficient to successfully apply them under limited supervision in multiple situations. Knowledge of: • Applicable programming languages and coding techniques. • Systems hardware, software and data communications functionality and capability. • Systems Development Life Cycle (SDLC) deliverables and tools. • Process management, performance tracking and measurement tools. • Data driven problem-solving techniques and technical report writing • Various cross-platform software systems. • Configuration management concepts and tools. • System and business architecture design concepts. • Information Technology Library Infrastructure (ITIL) framework and best practices. • Applicable industry standards for security systems. Skill in: • Implementing, maintaining, and troubleshooting software systems. • Designing, creating, and interpreting flowcharts. • Testing software or hardware security installations, enhancements and upgrades. • Troubleshooting and resolving software related issues. Ability to: • Oversee the work of others, and provide coaching, mentoring and training. • Set priorities and establish a systematic course of action to ensure accomplishment of objectives on time and within budget. • Deal with ambiguity and make decisions with limited information. • Exercise creativity and imagination in approaching assignments. • Quickly grasp new ideas and concepts. • Work well within a team and assist others with their assignments. • Acquire and maintain knowledge of the business of JEA and Technology Services products. • Research and acquire knowledge of developing information technology trends and emerging technologies. • Identify what issues need to be communicated and inform others. • Establish and maintain effective working relationships with internal customers. • Use communication skills, orally and in writing, with users with varied backgrounds and experience. • Follow through with commitments.
    $82k-105k yearly est. 5d ago
  • Residential Architect

    The Encompass Group 4.6company rating

    Security Architect job 246 miles from Gainesville

    The Encompass Group is excited to partner with a prestigious and rapidly growing firm in the interior architecture and design space, located in the Palm Beach area. This exceptional firm is known for its innovative design approach and commitment to delivering high-end, design-driven commercial and corporate interior projects. We are currently seeking an experienced Senior Architect with experience in high-end residential homes who is looking to take on a leadership role with significant ownership opportunities. This is your chance to shape the direction of a thriving firm and help guide its growth while contributing your expertise to award-winning projects. Why You'll Love It Here: Autonomy & Leadership: As a Senior Architect, you'll lead projects with full autonomy. This is a role where your experience and judgment are valued, and you'll have the independence to drive design decisions without micromanagement. Design Excellence: We focus on unique, high-quality design solutions that go beyond the ordinary. Your creativity will be at the forefront, shaping exceptional environments that reflect the client's vision. Ownership Opportunities: We're not just offering a job; we're offering a chance to become a key player in a growing firm. The right individual will have the opportunity to take on ownership responsibilities, contributing to the firm's long-term success. Collaborative Culture: Work alongside a talented team where collaboration, respect, and shared success are the foundation of the firm's culture. Qualifications: Degree & Licensure: You hold a professional (NAAB Accredited) degree in Architecture or are a licensed architect (or actively pursuing licensure). Experience: You bring 5+ years of experience in architectural design, preferably in commercial and corporate interior projects. Your portfolio showcases your ability to lead and innovate. Proficiency in Revit: A strong command of Revit and other production tools will be crucial for your success. Workplace Design Expertise: If you have experience with corporate interiors or workplace design, you'll be an even better fit for this role. Leadership Potential: You're looking for more than just a position. You're ready to step into a role where your leadership can influence the firm's direction, with a long-term view toward ownership.
    $80k-122k yearly est. 30d ago
  • Salesforce Architect

    Avanos Medical 4.2company rating

    Security Architect job 327 miles from Gainesville

    Job Title: Salesforce Architect Job Country: United States (US) Here at Avanos Medical, we passionately believe in three things: Making a difference in our products, services and offers, never ceasing to fight for groundbreaking solutions in everything we do; Making a difference in how we work and collaborate, constantly nurturing our nimble culture of innovation; Having an impact on the healthcare challenges we all face, and the lives of people and communities around the world. At Avanos you will find an environment that strives to be independent and different, one that supports and inspires you to excel and to help change what medical devices can deliver, now and in the future. Avanos is a medical device company focused on delivering clinically superior breakthrough solutions that will help patients get back to the things that matter. We are committed to creating the next generation of innovative healthcare solutions which will address our most important healthcare needs, such as reducing the use of opioids while helping patients move from surgery to recovery. Headquartered in Alpharetta, Georgia, we develop, manufacture and market recognized brands in more than 90 countries. Avanos Medical is traded on the New York Stock Exchange under the ticker symbol AVNS. For more information, visit . Essential Duties and Responsibilities: The Salesforce Solution Architect & Developer at Avanos is responsible for both designing and implementing scalable, secure, and high-performing Salesforce solutions. This role involves defining data models, security frameworks, and integration architectures to align with business objectives and IT strategy. Beyond architecture, it requires hands-on development, including Apex programming, Lightning Web Components (LWC), Visualforce development, and process automation using Flows and Triggers. Additionally, the architect-developer manages API integrations with third-party systems, leveraging SAP-BTP and middleware platforms for seamless data exchange. Key responsibilities include optimizing performance, enforcing security, and implementing DevOps best practices using SFDX, Git, and CI/CD pipelines for efficient deployments. The role involves close collaboration with stakeholders, functional teams, and developers, translating business needs into scalable technical solutions while leading development efforts for successful Salesforce implementations. At Avanos, this position leads Salesforce platform architecture and implementation, ensuring adherence to industry best practices while enhancing the company's Salesforce ecosystem. The ideal candidate has deep expertise in Salesforce multi-cloud solutions, including Sales, Service, Experience, and Data Cloud, along with strong project management skills to drive initiatives from discovery to deployment. This role will be required to be onsite at our Alpharetta Corporate office as well as at our Innovation and Development Lab, located in the Corporate Innovation Center at Georgia Tech in Midtown Atlanta. Key Responsibilities: Salesforce Architecture & Solution Design Design scalable, high-performance Salesforce solutions that align with business needs. Define data models, security frameworks, and integration architectures to ensure system integrity. Develop a multi-cloud Salesforce strategy across Sales, Service, Experience, and Data Cloud. Ensure compliance with security best practices, governance policies, and regulatory requirements. Establish and enforce Salesforce best practices, coding standards, and DevOps methodologies. Define and validate non-functional (technical) requirements while ensuring traceability between requirements and application architecture/design. Identify business process changes and application architecture decisions to optimize Salesforce functionality. Development & Customization Build and maintain custom Apex classes, Lightning Web Components (LWC), Visualforce pages, and automation processes (Flows & Triggers). Develop and deploy new and existing Apex, Visualforce, JavaScript, and Lightning Components. Customize and configure Salesforce features, objects, workflows, validation rules, and page layouts to support business requirements. Develop and deploy custom apps, reports, dashboards, and workflows within Salesforce. Support Sales, Service, Communities, CloudCraze (eCommerce), and Shield Products. Administer and support integration with CPQ. Develop expertise in the functionality and operation of critical enterprise applications to support business objectives. Experience with AI-driven Salesforce solutions and Einstein Analytics. Integration & Data Management Design and implement real-time and batch integrations between Salesforce and SAP. Support bi-directional deep integration with SAP S/4HANA, managing multiple master data, order transactions, and pricing structures. Work with SAP-BTP, middleware solutions, and API management to facilitate data exchange. Develop and manage Salesforce integration with third-party systems (ETL, REST, SOAP, JSON, etc.). Evaluate data quality issues and define/implement corrective actions. Participate in design reviews with third-party partners to ensure seamless integration. Interface with other IT disciplines to successfully complete implementations. Security, Compliance & Performance Optimization Work in collaboration with IT Security to ensure all Salesforce implementations meet security and compliance requirements. Implement data protection measures and ensure compliance with industry regulations (e.g., HIPAA, GDPR, FDA). Monitor and optimize Salesforce performance and system scalability. DevOps & Deployment Manage code promotion, sandbox environment management, and test case development. Utilize Git for version control and CI/CD pipelines for efficient deployments. Create, review, and execute test scripts and participate in integration testing with end-users, technical teams, and third-party SAP configuration partners. Collaboration & Leadership Partner with business stakeholders to translate requirements into scalable Salesforce solutions. Lead and mentor Salesforce developers and administrators, ensuring best practices and continuous learning. Provide technical consultation on current state and potential future state changes. Drive Salesforce initiatives from discovery to deployment, ensuring alignment with IT strategy. Drive the end-to-end implementation of Salesforce projects, ensuring timely delivery and adherence to business goals. Develop and maintain a structured project management approach, including timelines, milestones, and risk mitigation plans. Lead functional and business design sessions, collaborating with stakeholders to define objectives and deliverables. Provide detailed level-of-effort estimates, articulating the feasibility and risks of proposed solutions. Oversee testing, deployment, and post-implementation support to ensure solution success. Coach and mentor junior team members, fostering skill development and innovation. Your qualifications Required: Bachelor's degree in computer science, Information Technology, or a related field. 10+ years of CRM industry experience, with the majority focused on Salesforce architecture and implementation. Expertise in Salesforce clouds including Sales, Service, Experience, and Data Cloud. Strong project management skills, with experience managing Salesforce solution implementations. Proficiency in Salesforce configuration, Apex, SOQL, SOSL, XML, HTML, JSON, Visualforce, JavaScript, and development of Lightning Components (LWC). Experience with API integrations (REST, SOAP) and third-party application integrations. Expertise of Salesforce security, data modeling, and system architecture. Excellent written and verbal communication skills, with the ability to collaborate across technical and non-technical teams. Up-to-date knowledge of Salesforce releases, features, and industry best practices. Preferred: Salesforce Certified Application Architect Salesforce Certified System Architect Salesforce Certified Platform Developer I/II Additional certifications such as Admin, App Builder, or Integration Architecture Designer are a plus. The statements above are intended to describe the general nature and level of work performed by employees assigned to this classification. Statements are not intended to be construed as an exhaustive list of all duties, responsibilities and skills required for this position. Avanos Medical is an equal opportunity employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veteran status, sexual orientation, gender identity or any other characteristic protected by law. If you are a current employee of Avanos, please apply here Join us at Avanos Join us and you can make a difference in our products . click apply for full job details
    $97k-119k yearly est. 5h ago
  • Architect

    The Preston Partnership 3.8company rating

    Security Architect job 309 miles from Gainesville

    We are hiring best-in-class architects in the early stages of their career, including graduate architects and those with 1 - 5 years' experience, to join our team at The Preston Partnership designing multi-family and mixed-use projects. The ideal candidate will be pioneering, communicative, passionate, collaborative, detail oriented, technology savvy, and with an eye for good design. We are committed to an immersive experience in the design of all our projects, leaning on software including Revit, Enscape, Twinmotion, Oculus, and Unreal Engine. It is a progressive and collaborative design approach that brings clients, consultants and contractors into the virtual world alongside us. We are a firm rooted in values, core priorities, and individually tailored growth plans that allow our staff to reach their full potential. Additionally, we practice the 5 Voices Leadership Program, with a focus on how to communicate effectively with everyone you lead. Salary and compensation will be on the higher end of the market, with ownership options after 1 year of tenure.
    $62k-75k yearly est. 28d ago
  • MICROSOFT ARCHITECT

    Seminole Hard Rock Support Services 4.4company rating

    Security Architect job 276 miles from Gainesville

    Job Description A Microsoft Architect is a strategic role focused on designing, developing, and implementing complex solutions using Microsoft technologies and platforms. This role requires a deep understanding of both business needs and technical capabilities to translate requirements into secure, scalable, and reliable architectures. Microsoft Architects often act as technical leaders, guiding teams and stakeholders throughout the project lifecycle. Responsibilities Design and Implement Hybrid Solutions: Architect and deploy hybrid Active Directory and Exchange environments, ensuring seamless integration between on-premises and cloud services. Azure AD and Tenant Management: Manage and optimize Azure AD and Azure Tenant environments, including user and group management, directory synchronization, and identity protection. Messaging and Collaboration: Oversee the design, implementation, and management of messaging and collaboration solutions, including Exchange Online, Microsoft Teams, and SharePoint Online. Azure Security Access: Implement and manage Azure security solutions, including Conditional Access policies, Multi-Factor Authentication (MFA), and Identity Protection. Endpoint Management: Utilize Intune and Autopilot for endpoint management, ensuring secure and efficient deployment, configuration, and management of devices. Technical Leadership: Provide technical leadership and guidance to the IT team, ensuring best practices and standards are followed. Project Management: Lead and manage projects related to Microsoft technologies, ensuring timely delivery and alignment with business objectives. Documentation and Training: Develop and maintain comprehensive documentation and provide training to IT staff on Microsoft technologies and best practices. Qualifications Education: Bachelor's degree in Computer Science, Information Technology, or a related field. Advanced degree or relevant certifications (e.g., Microsoft Certified: Azure Solutions Architect Expert) are a plus. Experience: Minimum of 7-10 years of experience in IT architecture and engineering, with a focus on Microsoft technologies. Technical Skills: Extensive experience with hybrid Active Directory and hybrid Exchange environments. Proficiency in Azure AD and Azure Tenant management. Strong knowledge of messaging and collaboration tools, including Exchange Online, Microsoft Teams, and SharePoint Online. Expertise in Azure security access, including Conditional Access, MFA, and Identity Protection. Experience with endpoint management using Intune and Autopilot. Proficiency in PowerShell scripting and automation. Soft Skills: Excellent problem-solving skills, strong communication and interpersonal skills, and the ability to work effectively in a team environment. Preferred Certifications Microsoft Certified: Azure Solutions Architect Expert Microsoft Certified: Azure Security Engineer Associate Microsoft Certified: Azure Administrator Associate Microsoft Certified: Modern Desktop Administrator Associate #IndeedSHRSS #LI-Onsite #zipcorporate
    $99k-133k yearly est. 43d ago
  • Azure Architect

    Integrated Technology Strategies, Inc. 3.9company rating

    Security Architect job 309 miles from Gainesville

    Salary: 75 Integrated Technology Strategies is a provider of information technology consulting. Digital transformation, improving business performance, developing strategies and enhancing value is at the core of what we are. We need a Senior Project Manager to be part of our Consulting team. We are looking for a candidate who has primary responsibility for developing, organizing, managing, and controlling complex projects across IT. Position: Azure Architect Applications Java Development exp needed Location: Raleigh, NC - Hybrid Mode Duration: 12+ months Hiring Mode: Fulltime / Contract Requires Skills: Java, JavaScript, Kubernetes, Postgres, Service Bus. Job Description: 10+ years of experience in software engineering Proven experience in a full stack software development environment Experience leading, coaching, influencing, and collaborating in a matrixed environment. Understanding of and experience within an Agile framework preferred Comfortable with a broad set of technologies, Deep knowledge of middleware Java stack, Spring framework, Oracle, messaging technologies (EMS or KAFKA) RESTful APIs and web containers. Experience with UI tech stack/Single Page Applications desirable: HTML, JavaScript, and Angular is a plus. Exposure to SQL/PLSQL and Experienced with Azure-based service implementation and deployment. Possess full-stack software development knowledge and critical thinking skills to craft end-to-end solutions. A passion to learn new things, especially Asset Management and Fixed Income investing. You are self-motivated, driven, and have a strong client focus and results orientation approach. Comfortable developing Angular based user interfaces and Java based middle tier services. Familiarity with developing and running software on cloud service providers like Azure. Experience/ Qualifications: MCA/B. Tech/Any Graduate with 5-7 years of relevant experience
    $73k-119k yearly est. 45d ago
  • Information Security Manager

    Amphenol Sensors 4.5company rating

    Security Architect job 62 miles from Gainesville

    The Information Security Manager is responsible for safeguarding all IT infrastructure by monitoring security operations, responding to threats, remediating issues, and maintaining security applications and technologies. This role collaborates with the compliance team to ensure information security policies align with customer requirements and regulatory standards. The Information Security Manager continuously evaluates threats and risks to maintain strong security posture, implements appropriate preventative controls and protocols, and partners with internal and external auditors to assess and enhance the security program. Additionally, this role is responsible for employee security training and the overall management of information security operations. ESSENTIAL JOB FUNCTIONS * Partner with senior management, infrastructure managers, engineers, technicians, business stakeholders, customers, and vendors to develop, implement and maintain the enterprise information security strategy and roadmap. * Continuously analyze all risk vectors on the attack surface to create a risk respond plan, security posture, and help business understand and co-manage risks appropriately. * Ensure the protection and operation of IT infrastructure and applications. * Manage day-to-day security operations (threat detection, respond, remediation, perform digital forensics, incident management, problem management, change management, vulnerability management, monitoring, and compliance) * Lead and support continuous improvement projects to deploy, consolidate, enhance, and/or secure enterprise IT systems and services. * Provide security expertise during daily infrastructure standup meetings to address emerging threats and operational security concerns. * Ensure proper configuration of servers and endpoints, ensuring that they are maintained, monitored, updated, patched, secured; maintain up time as close as possible to 99.90%. * Manage the security of LAN, WAN, networking equipment (i.e. switches, routers, firewalls, access points, SDWAN) to ensure they are properly configured, maintained, monitored, updated, patched, secured, with uptime as close as possible to 99.90%. * Ensure cloud infrastructure, including Microsoft tenant, Azure Active Directory (now Microsoft Entra ID), Teams, SharePoint, UCaaS (Fusion Connect, Net2Phone), and all other Microsoft productivity applications, maintaining uptime targets of 99.90%. * Proactively monitor the infrastructure eco system to properly scale, grow, and secure in concert with business growth and new program development. * Ensure proper back up and disaster recovery are in place and proactively monitored to achieve service level agreements (SLAs) for Recovery Point Objective (RPO) and Recovery Time Objective (RTO).- * Ensure the protection of data privacy. * Manage and Maintain controls in compliance with NIST 800 171 and CMMC 2.0 requirements. * Support licensing compliance and licensing annual true-up activities. * Support customer and regulatory compliance audits. * Assist and adhere to ITGC compliance requirements. * Oversee end-users access management throughout the organization. * Conduct and assist with regularly scheduled user access reviews in active directory and other applications as needed. * Collaborate with IT project managers with strategic and important projects. * Maintain current and accurate documentation for the following: SOP (standard operating procedures, processes, contracts, software licensing, managed services, systems, and networks * Stay informed on emerging trends and technologies in IT, ensuring that the organization remains competitive and protective. * Other duties as required in support of the department and the company* SUPERVISOR RESPONSIBILITIES No direct report at this time but will have strong dotted line to supporting resources. QUALIFICATIONS To perform this job successfully, an individual must be able to perform each essential job function satisfactorily. The requirements listed below are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. EDUCATION and EXPERIENCE * Bachelor's degree in Information Technology field or related field preferred, or a minimum of five (5) years of experience in information Security or IT. * Five (5) years of progressive experience in professional IT position(s) required. * Minimum of two (2) years of experience managing information security program is required. * A strong technical background in a variety of IT areas is required. * Experience with IT Service Management (ITSM) systems is strongly preferred. * Industry experience in manufacturing, aerospace, military, and defense, or cable assembly is preferred. CERTIFICATES, LICENSES, REGISTRATIONS * Strongly Preferred: CompTIA Security +, CISSP (Certified Information System Security Professional), CISM (Certified Information Security Manager), CEH (Certified eEhical Hacker), CompTIA A+, CompTIA Server+, CompTIA Network+, CompTIA PenTest+, CCSP (Certified Cloud Security Professional). JOB SKILLS * Strong proficiency with network and cloud security management. * Incident response, perform digital forensics, create, execute, and maintain incident response plan. * Programming and scripting in PowerShell and SQL. * Risk assessment and risk response plan. * Penetration testing * User training * Critical thinking, technical curiosity, deliver results, and cross functional collaboration. * Proficient in Microsoft 365, Microsoft Azure, Microsoft Entra, Windows Remote Desktop, Active Directory administration, VMware vCenter, Cisco networking, server administration, LAN/WAN administration, UCaaS. * Familiar with planning, purchasing, and sourcing. * An energetic, forward-thinking, proactive, and creative individual with high ethical standards. * Ability to be flexible and able to function comfortably in a fast paced, constantly changing, and ambiguous environment. * Strong Business Acumen with the ability to understand the business and be able to align IT strategies with business objectives, as well as communicate the value of IT initiatives to business leaders. * Positive attitude with a strong sense of urgency and ownership of quality work deliverables. PHYSICAL DEMANDS While performing the duties of this job, the employee must be able to be stationary for prolonged periods working on a computer. The employee regularly required to use hands to finger, handle or feel, and talk or hear. The employee frequently required to reach with hands and arms. The employee required to stand and walk. The employee must occasionally lift and/or move up to 20 pounds. Specific vision abilities required by this job include close vision, distance vision, color vision, peripheral vision, depth perception, and the ability to adjust focus. WORK ENVIRONMENT The work environment characteristics described here are representative of those an employee encounter while performing the essential functions of this job. Work performed in a normal office environment with minimal physical risks involved. The noise level in the work environment is low to moderate. ENVIRONMENTAL POLICY Carlisle Interconnect Technologies is dedicated to identifying and reducing the environmental impact of its operations, activities, and products. It is our commitment to comply with all applicable laws and other regulatory requirements concerning the environment. We are committed to preventing pollution and continually improving our environmental performance in all our global operations. This will be achieved through a comprehensive Environmental Management System that provides the framework for setting and reviewing environmental objectives and targets of Carlisle Interconnect Technologies. PERSONAL PROTECTIVE EQUIPMENT REQUIREMENTS * ASTM F-2412-2005, ANSI Z41-1999, or ANSI Z41-1991 rated safety toe shoes in specific areas. * Clear ANSI Z87.1 safety-rated glasses in specific areas. * Hearing protection, in specific locations. * Ability to compile with JSA in specific areas. EXPORT COMPLIANCE DISCLAIMER This position includes access or potential access to ITAR and/or EAR technical data. Therefore, candidates will need to qualify as a US Person which is defined as a US Citizen, or a Permanent Resident (Green Card Holder). TRAVEL 5% - 25%
    $90k-114k yearly est. 50d ago
  • SAP GRC/Security Senior Consultant

    Turnkey Consulting

    Security Architect job 309 miles from Gainesville

    Job Title: SAP GRC/Security Senior Consultant Company: Turnkey Consulting Location: United States (Considering candidates in any US location that are fully authorized to work in the US - Applicants needing sponsorship will NOT be considered) About Turnkey Consulting Turnkey Consulting is a leading advisory and implementation organization with deep expertise in risk management, governance, and compliance & security. Having the ability to provide end-to-end solutions that integrate technology, process, and people. Our business started within the SAP ecosystem, however expansion into being an agnostic partner, now gives us a wider range of solutions to support our customers, while securing their wider estate. Turnkey Consulting helps businesses optimize their risk management, security and compliance programs, protect against Cyber threats, reduce costs, and improve their operational efficiency. With a team of seasoned risk professionals and a commitment to excellence, we empower businesses to proactively protect their critical assets and stay ahead of evolving threats. Job Summary The candidate will play a key role in handling client engagements, as well as utilizing strong technical experience to find solutions that best fit our clients' needs. We are looking for a team-player and strong all-rounder with at least 2 implementations and 2 years of practical experience in the following areas Detailed understanding of the SAP authorization concept in one or more of the following areas: ECC, SAP S/4 HANA, HCM, CRM, SRM, BW, BI, BPC, SAP HANA, SAP BTP Experience of designing, building and implementing SAP security and authorization solutions Experience in SAP designing, configuring, and implementing SAP role re-designs specifically for S4 HANA and Fiori Exposure to various system user interfaces (UI), including SAP but also other relevant SaaS products Detailed understanding of SAP GRC suite of applications, with a demonstrable specialism in core modules contained within (ideally v12 onward) Experience of IDM solutions, either SAP's IDM solution, or non-SAP, such as SailPoint or Saviynt would be of advantage. Experience in implementation and/or administration of SAP BIS would be an advantage Experience of third-party solutions to secure SAP estates also an advantage Experience of SAP Fiori catalogs, groups, pages and spaces Experience of SAP IAG solutions would be an advantage, both IAS and IPS Experience with scripting languages such as Python and JSON would be an advantage Our experienced consultants are a key driver of our success as one of the most trusted names in the end-to-end security arena and we are committed to delivering to a consistently high standard. Key responsibilities of the role are: Task management of large / complex implementations, especially in aApplication security or enterprise risk/identity projects Implementation of GRC technology and supporting modules Work with clients to understand "why" they're in need of such solutions, define requirements and configure solutions to best fit those needs Perform controls and configuration reviews involving relevant application systems and processes Advise clients on controls in their enterprise systems relating to regulatory or legislative compliance Review and advise on security redesign and remediation projects Provide a broader range of information risk management solutions to clients as required Build relationships with new clients and maintain good relations with our existing client base Integrate solutions into wider cybersecurity controls estates We are looking ideally for someone with the following attributes: The ability to troubleshoot and diagnose problems / issues and provide prompt, robust resolution An enquiring mind to discover "why" clients need to introduce theintroduce controlling measures. The ability to manage projects within varied client engagements and lead reviews and implementations Knowledge of corporate business processes and their control points Good understanding of various IT regulations and standards, including:including Sarbanes Oxley, COBIT, ISO series & the GDPR Bachelor's degree Professional certification (e.g. CISA, M.Inst.ISP, CISSP, ISO) SAP certification (Security, GRC) Consulting background Strong written and verbal communication skills Integration experience Ability to act as an SME to install, design, engineer and configure security solutions to meet client needs Ability to effectively manage own time and priorities effectively and to work both as part of a team and individually. Able to communicate technical and functional requirements to both the business and IT Key responsibilities of the role will include: Project manage large / complex SAP Security implementations, especially for S/4 HANA projects Implementation of GRC Access Controls and supporting modules Work with clients to understand requirements and configure solutions to best fit those needs Perform controls and configuration reviews involving SAP systems Advise clients on controls in SAP relating to regulatory or legislative compliance Review and advise on SAP security redesign and remediation projects Provide a broader range of information risk management solutions to clients as required Build relationships with new clients and maintain good relations with our existing client base Integrate solutions into wider cybersecurity controls estates We are an Equal Opportunity Employer and do not discriminate against any employee or applicant for employment because of race, color, sex, age, national origin, religion, sexual orientation, gender identity and/or expression, status as a veteran, and basis of disability or any other federal, state or local protected class. When we collect your personal information as part of a job application or offer of employment, we do so in accordance with industry standards and best practices and in compliance with applicable privacy laws.
    $78k-108k yearly est. 60d+ ago
  • Manager, Information Security

    HD Supply 4.6company rating

    Security Architect job 309 miles from Gainesville

    Responsible for providing digital forensics, monitoring and compliance related to relevant requirements as requested by the CISO or the legal department. Ensure compliance with all relevant internal instructions and external regulatory compliance standards, including the management of operational risk and adherence to Company Code of Conduct and behaviors. **Major Tasks, Responsibilities, and Key Accountabilities** + Oversees and performs computer forensic services including digital evidence collection, preservation, analysis, data recovery, tape back-up and recovery, electronic mail extraction, database examination and address relevant situational requirements. + Performs comprehensive technical analyses and interpretations of computer-related evidence such as e-mail, accounting software, various databases, and information stored on electronic devices. + Communicates effectively with internal customers and stakeholders about investigation status, information security capabilities and counsels requestors on information security guidelines, policies and procedures. + Interviews witnesses who have contravened regulations and generates actionable reports. + Keeps data in correct format, restores files and catalogue data and maintains strict confidentiality at all times. + Maintains detailed written work logs and case documentation following forensic procedures. + Utilizes various monitoring and filtering tools to measure and report on the state of security compliance. + Ensures all lab hardware and software are verified and validated as required by various rules of evidence. **Nature and Scope** + Solutions require analysis and investigation. + Achieves planned results by decisions and actions based on professional methods, business principles, and practical experience. + Manages a group or team of professional individual contributors and/or indirectly supervises support staff. **Work Environment** + Located in a comfortable indoor area. Any unpleasant conditions would be infrequent and not objectionable. + Most of the time is spent sitting in a comfortable position and there is frequent opportunity to move about. On rare occasions there may be a need to move or lift light articles. + Typically requires overnight travel less than 10% of the time. **Education and Experience** + Typically requires BS/BA in a related discipline. Generally 7+ years of experience in a related field. May require certification. Advanced degree may offset less experience in some disciplines. **Our Goals for Diversity, Equity, and Inclusion** We are committed to creating a culture that promotes equity, respect, and advocacy for every HD Supply associate. We value the diversity of our people. **Equal Employment Opportunity** HD Supply is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected veteran status, or disability status. HD Supply is an Equal Opportunity Minority/Female/Individuals with Disabilities/Protected Veteran and Affirmative Action Employer. HD Supply considers for employment and hires qualified candidates without regard to age, race, religion, color, sex, sexual orientation, gender, gender identity, national origin, ancestry, citizenship, protected veteran or disability status or any factor prohibited by law.
    $96k-124k yearly est. 60d+ ago
  • Director of Information Security and Compliance

    Loyola Marymount University 3.5company rating

    Security Architect job 295 miles from Gainesville

    The LMU Information Technology Services team enables technologically-rich learning environments, provides effective teaching and scholarship resources and maintains reliable, accessible, and integrated information systems. This work is grounded in and supports the University' mission: • The encouragement of learning • The education of the whole person • The service of faith and the promotion of justice Under the general direction of the CIO/Vice President for Information Technology, the Director of Information Security and Compliance will drive the university's efforts to protect its information assets and ensure compliance with relevant regulations and standards. This role is pivotal in creating a secure and compliant digital environment that supports LMU's mission, values, and goals. The Director will leverage partnerships and collaboration to lead initiatives that result in measurable improvements in information security and compliance, fostering a culture of security awareness and proactive risk management. The Director will serve as the process owner of the appropriate second-line assurance activities not only related to confidentiality, integrity and availability, but also to the safety, privacy and recovery of information owned or processed by LMU in compliance with regulatory and university requirements. The Director will oversee the university's compliance with applicable laws, regulations, and policies related to information security and privacy. Position Specific Responsibilities/Accountabilities Enhance Security Posture: Develop and implement a comprehensive information security program that significantly reduces risks and vulnerabilities across the university's digital landscape. Ensure Regulatory Compliance: Achieve and maintain compliance with relevant regulations and standards, ensuring that LMU meets all legal and regulatory requirements. Collaborative Protection: Work closely with various campus partners, external stakeholders, and community partners to ensure that information assets and associated technologies are protected, resulting in a cohesive, unified, and well understood approach to information security and compliance. Risk Management: Conduct thorough risk assessments and implement effective mitigation strategies, leading to a demonstrable reduction in potential threats. Incident Response: Oversee and improve incident response and recovery efforts, ensuring swift and effective investigation and resolution of security incidents. Policy Development: Create and enforce robust policies and procedures that safeguard information assets, leading to a well-documented and easily accessible framework for information security. Training and Awareness: Provide comprehensive training and guidance to staff on information security best practices, resulting in a well-informed and vigilant workforce. Monitoring and Reporting: Continuously monitor and report on the effectiveness of the information security program, providing clear metrics and insights that demonstrate progress and areas for improvement. Leadership and Strategy: Plan and manage the strategy, people, processes, tools, services, and resources necessary to effectively support the program and meet strategic goals. Business Continuity and Disaster Recovery: Orchestrate a secure, robust, and highly reliable approach to providing ITS services, during and after a disaster or disruption, to minimize negative impacts to business operations and maintain essential services. Data Governance: Oversee the university's data governance efforts, ensuring that data is managed securely and in compliance with university policies and legal requirements. Perform other related duties. Loyola Marymount University Expectations Exhibit behavior that supports the mission, vision, and values of the university. Communicate and employ interpersonal actions that model high standards of professional, responsible, accountable, and ethical conduct. Demonstrate a commitment to outstanding customer service. Requisite Qualifications Typically a Bachelor's Degree from an accredited four-year institution in Computer Science, Information Technology, or Cybersecurity. Seven years of experience ininformation security, with at least three years in a management role. Professional certifications such as CISSP, CISM, or CISA are highly desirable. Experience in developing and implementing technology policy, preferably in a University environment. Strong knowledge of frameworks, standards, and best practices relating to Information Security, Privacy, Data Governance, and Business Continuity and Disaster Recovery Experience with regulatory compliance requirements (e.g., i.e. FERPA, HIPAA, GDPR, CCPA, and PCI-DSS). Demonstrated excellent verbal and written communication skills, as well as presentation skills. Writing samples may be required. Excellent leadership, analytical, problem-solving, and decision-making skills. Strong communication and interpersonal skills, with the ability to effectively collaborate with diverse stakeholders. Demonstrated ability to lead and manage a team of security professionals. The above statements are intended to describe the general nature and level of work being performed. They are not intended to be construed as an exhaustive list of all responsibilities, duties and skills required of this position. #HERC# #HEJ# Staff Regular Salary range $143,100.00 - $200,300.00 Salary commensurate with education and experience.Loyola Marymount University, a Carnegie classified R2 institution in the mainstream of American Catholic higher education, seeks outstanding applicants who value its mission and share its commitment to inclusive excellence, the education of the whole person, and the building of a just society. LMU is an equal opportunity employer committed to providing an environment free from discrimination and harassment as defined by federal, state and local law. We invite all persons in the full diversity of their being, life experience, and beliefs to apply. (Visit *********** for more information.)
    $143.1k-200.3k yearly 59d ago
  • Information Security Manager G129

    City of Columbus, Ga 4.0company rating

    Security Architect job in Georgia

    The Information Security Manager reports to the Assistant Director of Operations and is responsible for developing and implementing an information security program, which includes procedures and policies designed to protect enterprise communications, systems, and assets from both internal and external threats. The Information Security Manager also works for the Assistant Director to advise on procuring cybersecurity products and services and manage disaster recovery and business continuity plans. In addition to responding to data breaches and other security incidents, the Information Security Manager is tasked with anticipating, assessing, and actively managing new and emerging threats. The Information Security Manager must work with others across different departments and divisions to align security initiatives with broader business objectives and mitigate the risks various security threats pose to the organization's mission and goals. * Build a comprehensive security program to include incident response plan, strategic security protocols and procedures. * Review existing security measures and update protocols as needed. * Oversee the operations of all information security-related programs, including but not limited to email security, cyber security training, security log management, etc. * Overseeing the daily operations of the Columbus Consolidated Government to identify potential information security risks and room for improvements. * Fostering a culture of information security awareness by conducting training sessions and communicating with personnel. * Managing, evaluating, and resolving any information security incidents or breaches. * Ensuring that the CCG's security policies comply with federal laws and legislations. * Presenting risk assessments and improved security policies to management team members. * Working with management to develop and implement an appropriate budget for security programs. * Excellent understanding of state and federal information security laws. * Proven proficiency in developing information security protocols and procedures. * Solid communication and interpersonal skills. * Proficiency in information management systems and extensive knowledge of cybersecurity. * Ability to research and stay up to date with security trends, as well as changing government and state laws. Bachelor's Degree or Higher in Cybersecurity, Information Technology, Computer Science or related field. Sufficient experience which provides the required knowledge, skills, and abilities to perform the job's essential functions. Typically, would have three years in Information Technology in a similar role. Possess CompTIA Security+ or the current equivalent within 18 months of hire. The employee must frequently lift light and heavy objects, climb ladders, use tools or equipment requiring a high degree of dexterity, and distinguish between shades of color. Additionally, the following physical abilities are required: * Feeling - perceiving attributes of objects by touch with skin, fingertips. * Grasping - applying pressure to object with fingers, palm. * Handling - picking, holding, or working with whole hand. * Hearing 1 - perceiving sounds at normal speaking levels, receive information. * Hearing 2 - receive detailed information, make discrimination in sound. * Manual Dexterity - picking, pinching, typing, working with fingers rather than hand. * Mental Acuity - ability to make rational decisions through sound logic, deductive reasoning. * Reaching - extending hands or arms in any direction. * Repetitive Motion - substantial movements of wrists, hands, fingers. * Speaking - expressing ideas with spoken word, convey detailed, important instructions accurately, concisely. The work is typically performed while working in the field, standing, stooping, walking, bending, or crouching.
    $61k-81k yearly est. 60d+ ago

Learn more about security architect jobs

How much does a security architect earn in Gainesville, FL?

The average security architect in Gainesville, FL earns between $78,000 and $172,000 annually. This compares to the national average security architect range of $92,000 to $179,000.

Average security architect salary in Gainesville, FL

$116,000
Job type you want
Full Time
Part Time
Internship
Temporary